全文获取类型
收费全文 | 860篇 |
免费 | 0篇 |
国内免费 | 4篇 |
专业分类
864篇 |
出版年
2025年 | 3篇 |
2023年 | 6篇 |
2022年 | 1篇 |
2021年 | 33篇 |
2020年 | 33篇 |
2019年 | 47篇 |
2018年 | 30篇 |
2017年 | 54篇 |
2016年 | 39篇 |
2015年 | 12篇 |
2014年 | 92篇 |
2013年 | 101篇 |
2012年 | 43篇 |
2011年 | 41篇 |
2010年 | 53篇 |
2009年 | 37篇 |
2008年 | 32篇 |
2007年 | 33篇 |
2006年 | 35篇 |
2005年 | 30篇 |
2004年 | 31篇 |
2003年 | 15篇 |
2002年 | 13篇 |
2001年 | 15篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有864条查询结果,搜索用时 0 毫秒
611.
由科学技术是第一生产力可以得出,科学的军事理论就是战斗力,也是第一战斗力。这个看似显见的论断并不是可有可无,而是值得直白昭示、大力宣扬,它彰显了军事理论的极端重要性。科学的军事理论把握国家安全拓展规律,是军事人才培养的总体方针;科学的军事理论洞察军事技术发展规律,是武器装备建设的根本指导;科学的军事理论洞悉战争演变规律,是作战方式创新的根本遵循。 相似文献
612.
Colin D. Robinson 《Defense & Security Analysis》2019,35(4):423-429
ABSTRACTBagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state. 相似文献
613.
Murat Caliskan 《Defense & Security Analysis》2019,35(1):40-58
Hybrid warfare is the latest of the terms/concepts that have been used within the defence community in the last three decades to label contemporary warfare. It has been officially adopted in the core strategic documents of NATO, EU and national governments and has already inspired many articles, policy papers and books; however, this paper is unique in the sense that it analysis the hybrid warfare concept through the lens of strategic theory. It is argued that hybrid warfare does not merit the adoption as a doctrinal concept. Strategic theory instead, which lies at the nexus of all dimensions of warfare, provides a better viewpoint to approach contemporary warfare. It concludes that efforts should be directed towards exploring warfare under the light of eternal principles instead of proving the emergence of new types of warfare. 相似文献
614.
Caroline Varin 《African Security Review》2018,27(2):144-157
Since the 2003 war in Iraq, private military and security companies (PMSCs) have become increasingly legitimate actors in modern conflicts. Despite this normative shift, rumours in March 2015 regarding the use of South African mercenaries in Nigeria to combat Boko Haram insurgents caused an international outrage, while the Nigerian government remained nonchalantly silent on the matter. This article investigates the impact of mercenaries on the conflict in the last six months of the Jonathan government. Using primary and secondary qualitative research, it assesses the role that PMSCs played in Nigeria’s counterinsurgency strategy, along with the ensuing reaction of international and local media to the outsourcing of violence to foreign companies. The article concludes that – notwithstanding the improved image of PMSCs in the world, and the actual impact of the contractors on the Nigerian counterinsurgency effort – the stigma of mercenaries continues to plague the industry, particularly on the African continent. 相似文献
615.
616.
We analyze an interdiction scenario where an interceptor attempts to catch an intruder as the intruder moves through the area of interest. A motivating example is the detection and interdiction of drug smuggling vessels in the Eastern Pacific and Caribbean. We study two models in this article. The first considers a nonstrategic target that moves through the area without taking evasive action to avoid the interdictor. We determine the optimal location the interceptor should position itself to best respond when a target arrives. The second model analyzes the strategic interaction between the interceptor and intruder using a Blotto approach. The intruder chooses a route to travel on and the interceptor chooses a route to patrol. We model the interaction as a two‐player game with a bilinear payoff function. We compute the optimal strategy for both players and examine several extensions. © 2017 Wiley Periodicals, Inc. Naval Research Logistics, 64: 29–40, 2017 相似文献
617.
Mark Malan 《African Security Review》2017,26(4):341-361
This essay recalls the immediate and longer-term responses of the US and its allies to the events of 9/11. It contends that the die for contemporary developments in transnational terrorism was cast in the immediate aftermath of 9/11 – in particular the launching of sustained ‘anti-terrorist’ military combat operations in Afghanistan and Iraq, and more covert ‘kinetic’ operations elsewhere in the Middle East and Africa. The essay seeks specifically to expose the counter-productivity of using military operations as the primary antidote to transnational terrorism. Focusing on the African ‘laboratory’ and the spread of transnational terrorism and Islamic militancy, particularly in West and East Africa, the essay concludes that radical Islamists have mastered the ‘battle of the narrative’ and that the Western penchant for dispensing a kinetic brand of medication is feeding rather than fighting the virus of global terrorism. 相似文献
618.
Hans Liwång 《Defense & Security Analysis》2017,33(1):30-44
Risk management is a decision-support process and a vital tool for military planning and decision-making. Today, several nations utilize risk-based approaches to analyze the level of security in military operations. There are both strengths and challenges in applying risk-based approaches to support military decisions. In this article, the challenges related to risk communication are investigated with the aim of describing how a military organization should train to create a good environment for effective risk communication. The analysis finds that it is important for the organization to define and consistently use a shared risk understanding. Such a shared risk understanding will need a systematic development process that focuses on the future decision makers’ and analysts’ education and training. To reach understanding, all involved parties must have the chance to identify the problem, reflect on its implications, test different solutions and develop a solution. 相似文献
619.
Eva van Baarle Laura Hartman Desiree Verweij Bert Molewijk Guy Widdershoven 《Journal of Military Ethics》2017,16(1-2):56-77
Ethics training has become a common phenomenon in the training of military professionals at all levels. However, the perceived outcomes of this training remain open. In this article, we analyze the experiences of course participants who were interviewed 6–12 months after they had participated in a train-the-trainer course in military ethics developed by the Faculty of Military Sciences of the Netherlands Defence Academy. Through qualitative inductive analysis, it is shown how participants evaluate the training, how they perceive the development of their moral competence, and how they see the impact of the training on their own training practice. 相似文献
620.
发展军事职业教育是健全新型军事人才培养体系的重大举措。贯彻科技兴军战略,必须深刻认识提高军事职业教育质量水平的重大意义,清晰把握提高军事职业教育质量水平的内在要求,切实找准提高军事职业教育质量水平的重要抓手。 相似文献